Stack-based buffer overflow in the SCP command-line utility in PuTTY prior to 0.67 and KiTTY 0.66.6.3 and previous versions allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
9bis kitty |
||
simon tatham putty |